EIQ-2021-0016-2
ID |
EIQ-2021-0016-2 |
CVE |
|
Description |
Log4j versions earlier than 2.15 have a remote code execution vulnerability, affecting Logstash. Supersedes EIQ-2021-0016. |
Date |
Updated 20 December 2021 16:15 CET 14 December 2021 |
Severity |
3-HIGH |
CVSSv3 score |
|
Status |
Fixed in IC versions 2.9.4, 2.10.4, 2.11.1. |
Assessment |
Updated 20 December 2021 16:15 CET
Updated 16 Dec 2021 17:20 CET
Updated 15 Dec 2021 15:40 CET
Updated 15 Dec 2021 09:00 CET
This advisory supersedes EIQ-2021-0016 This is a developing situation. Currently known immediate mitigations are covered in this advisory, while we investigate longer-term mitigations. Previously in EIQ-2021-0016, we described CVE-2021-44228 as mitigated in the Intelligence Center by using certain versions of JDK. This is no longer true as of 11 December 2021. The Intelligence Center is bundled with 4 Java applications, of which only Logstash appears to be affected. Not affected: Kibana, and Neo4j
Mitigated: Hosted Intelligence Center
Mitigations for Elasticsearch
Mitigations for Logstash Logstash 7.9.1 is:
To mitigate CVE-2021-44228 within an Intelligence Center envionment, you should: Where $LOGSTASH_HOME is the home directory of your Logstash installation. Typically /usr/share/logstash.
Do not replace or upgrade affected Log4j packages used by Elasticsearch and Logstash versions bundled with the Intelligence Center Log4j 2.17.x should not be considered a drop-in replacement for affected Log4j libraries in Elastic products. Attempting to manually replace or upgrade the affected Log4j packages used by Elasticsearch and Logstash may cause them to stop working. |
Mitigation |
Upgrade the IC to >=2.9.4, >=2.10.4, >=2.11.1. If an upgrade is not possible, you can perform these mitigations:
See assessment for details. |
Affected versions |
2.9.x – 2.11.0 (affects Logstash and Elasticsearch 7.9.1) Hosted Intelligence Center instances have implemented mitigations; see assessment. |
Notes |
N/A |